Sciweavers

384 search results - page 23 / 77
» A Vector Approach to Cryptography Implementation
Sort
View
JSA
2000
116views more  JSA 2000»
15 years 1 months ago
Distributed vector architectures
Integrating processors and main memory is a promising approach to increase system performance. Such integration provides very high memory bandwidth that can be exploited efficientl...
Stefanos Kaxiras
JMLR
2006
93views more  JMLR 2006»
15 years 1 months ago
An Efficient Implementation of an Active Set Method for SVMs
We propose an active set algorithm to solve the convex quadratic programming (QP) problem which is the core of the support vector machine (SVM) training. The underlying method is ...
Katya Scheinberg
FSE
2005
Springer
118views Cryptology» more  FSE 2005»
15 years 7 months ago
A Side-Channel Analysis Resistant Description of the AES S-Box
So far, efficient algorithmic countermeasures to secure the AES algorithm against (first-order) differential side-channel attacks have been very expensive to implement. In this a...
Elisabeth Oswald, Stefan Mangard, Norbert Pramstal...
ARCS
2008
Springer
15 years 3 months ago
An Optimized ZGEMM Implementation for the Cell BE
: The architecture of the IBM Cell BE processor represents a new approach for designing CPUs. The fast execution of legacy software has to stand back in order to achieve very high ...
Timo Schneider, Torsten Hoefler, Simon Wunderlich,...
BMCBI
2005
112views more  BMCBI 2005»
15 years 1 months ago
Vector analysis as a fast and easy method to compare gene expression responses between different experimental backgrounds
Background: Gene expression studies increasingly compare expression responses between different experimental backgrounds (genetic, physiological, or phylogenetic). By focusing on ...
Rainer Breitling, Patrick Armengaud, Anna Amtmann